Preferred Language
Articles
/
fBiIk5cBVTCNdQwCK5lS
Implementing quantum key distribution based on coincidence detection captured from two different single photon detection modules
...Show More Authors

Quantum key distribution (QKD) provides unconditional security in theory. However, practical QKD systems face challenges in maximizing the secure key rate and extending transmission distances. In this paper, we introduce a comparative study of the BB84 protocol using coincidence detection with two different quantum channels: a free space and underwater quantum channels. A simulated seawater was used as an example for underwater quantum channel. Different single photon detection modules were used on Bob’s side to capture the coincidence counts. Results showed that increasing the mean photon number generally leads to a higher rate of coincidence detection and therefore higher possibility of increasing the secure key rate. The secure key rate can reach 0.0239 (bits/pulse) with a quantum bit error rate (QBER) of 3.2% for the free space channel and 1.5% for the simulated sea-water channel. The security parameters for each value of the mean photon number closely align with the corresponding theoretical predictions. However, some discrepancies were observed, primarily due to a mismatch in photon detection efficiency for SPDMs and system fluctuations. The theoretical calculations also predict that using coincidence detection, the key can be distributed over distances of up to 195 km.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Oct 01 2022
Journal Name
The Egyptian Journal Of Hospital Medicine
Detection of Bacterial Resistance Genes from Neonatal’s Incubators Environment at Selected Sites of Baghdad Hospitals
...Show More Authors

Scopus Crossref
Publication Date
Fri Feb 06 2026
Journal Name
Advances In Agriculture And Animal Sciences
Identification and Molecular Detection of Klebsiella spp. from the Buccal Cavity of Humans and Dogs
...Show More Authors

Klebsiella infections in the oral cavities of both humans and dogs have been increasingly reported and are associated with various buccal infections, as well as systemic infections. These infections appear to be rising particularly among pets and their owners, suggesting a possible bidirectional transmission between humans and dogs. Therefore, this study aimed to investigate the potential link of mixed infections involving Klebsiella pneumoniae and Enterococcus spp. Buccal cavity samples were collected from humans (n = 25) and dogs (n = 25). Samples were initially enriched in tryptic soy broth and subsequently cultured on tryptic soy agar, MacConkey agar, and blood agar. All isolates were identified using the VITEK 2 system, and eight selec

... Show More
View Publication
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Iranian Journal Of Earth Sciences
Resistivity surveys application for detection of shallow caves in a case example from Western Iraq
...Show More Authors

Scopus (2)
Scopus
Publication Date
Thu May 14 2026
Journal Name
Journal Of Baghdad College Of Dentistry
Validity of Hounsfield Units from computed tomographic images of mandibular bone in detection of osteoporosis
...Show More Authors

Background: The figure for the clinical application of computed tomography have been increased significantly in oral and maxillofacial field that supply the dentists with sufficient data enables them to play a main role in screening osteoporosis, therefore Hounsfield units of mandibular computed tomography view used as a main indicator to predict general skeleton osteoporosis and fracture risk factor. Material and Methods: Thirty subjects (7 males &23 females) with a mean age of (60.1) years underwent computed tomographic scanning for different diagnostic assessment in head and neck region. The mandibular bone quality of them were determined through Hounsfield units of CT scan images and were correlated with the bone mineral density v

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
Ieee Access
Keratoconus Severity Detection From Elevation, Topography and Pachymetry Raw Data Using a Machine Learning Approach
...Show More Authors

View Publication
Scopus (24)
Crossref (23)
Scopus Clarivate Crossref
Publication Date
Sun Sep 05 2010
Journal Name
Baghdad Science Journal
Detection of interleukin-6 and interleukin-8 in serum from women with recurrent spontaneous abortion
...Show More Authors

To investigate the role of IL-6 and IL-8 in the immune-regulatory mechanisms involved in the recurrent spontaneous abortion of the first trimester of pregnancy. Serum level of IL-6 and IL-8 were determined in 25 women of age (20-35) years who had a spontaneous abortion of unknown aetiology during the first trimester of pregnancy .They were compared with the corresponding levels of 20 pregnant and non-pregnant women as control groups .cytokine levels were measured by (ELISA) technique .The women with spontaneous abortion had highly significant (P < 0.01) increased serum level of IL-8 and highly significant (P < 0.01 ) decreased level of IL-6 compared to those with normal pregnant and non-pregnant women. The results of this study ma

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 03 2013
Journal Name
Baghdad Science Journal
The Predication of the Type of Jupiter Radio Storm from Two Different Iraqi Locations
...Show More Authors

A program in Visual Basic language was designed to predict the type of radio storm that emitted from Jupiter at specific Local Time (LT) from two different Iraqi locations (Baghdad and Basra), such storms result from the Central Meridian Longitude (CML) of system ??? for Jupiter and phase of Io’s satellite (?Io). Some of these storms are related to position of Io (Io- A,B,C,D) and others are unrelated (non-Io-A,B,C,D) to its position. The input parameters for this program were user specified by determining the observer’s location (longitude), year, month and day. The output program results in form of tables provides the observer with information about the date and the LT of beginning and end of each type of emitted storm. Two Io-storm r

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Apr 16 2019
Journal Name
Proceedings Of The 2019 5th International Conference On Computer And Technology Applications
Four Char DNA Encoding for Anomaly Intrusion Detection System
...Show More Authors

Recent research has shown that a Deoxyribonucleic Acid (DNA) has ability to be used to discover diseases in human body as its function can be used for an intrusion-detection system (IDS) to detect attacks against computer system and networks traffics. Three main factor influenced the accuracy of IDS based on DNA sequence, which is DNA encoding method, STR keys and classification method to classify the correctness of proposed method. The pioneer idea on attempt a DNA sequence for intrusion detection system is using a normal signature sequence with alignment threshold value, later used DNA encoding based cryptography, however the detection rate result is very low. Since the network traffic consists of 41 attributes, therefore we proposed the

... Show More
View Publication
Scopus (7)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Tue Apr 01 2025
Journal Name
Mesopotamian Journal Of Cybersecurity
The Impact of Feature Importance on Spoofing Attack Detection in IoT Environment
...Show More Authors

The Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Mon Dec 02 2019
Journal Name
Technologies And Materials For Renewable Energy, Environment And Sustainability
Effect of thickness variation CdO/PSi thin films on detection of radiation
...Show More Authors

CdO films were deposited on substrates from glass, Silicon and Porous silicon by thermal chemical spray pyrolysis technique with different thicknesses (130 and 438.46) nm. Measurements of X-ray diffraction of CdO thin film proved that the structure of the Polycrystalline is cubic lattice, and its crystallite size is located within nano scale range where the perfect orientation is (200). The results show that the surface’s roughness and the root mean square increased with increasing the thickness of prepared films. The UV-Visible measurements show that the CdO films with different thicknesses possess an allowed direct transition with band gap (4) eV. AFM measurement revealed that the silicon porosity located in nano range. Cadmium oxide f

... Show More
Scopus (2)
Scopus